A defect in the software on the iPhone and iPad devices discovered by a researcher. Reportedly, this flaw allows a hacker to make the application'toxic' is used to steal data in the device.
Researchers from Accuvant Lab, Charlie Miller test of this vulnerability by creating a clone of malicious programs. We tested is inserted into the AppStore, it turns out that Apple's security tests do not detect that the program is malicious, and meloloskannya.
I have found no evidence that any meddling hands that exploit this vulnerability in IOS software. But with the trial of Miller, now open the possibility of malware on the App Store.
"Until now you could mendonwload anything from the App Store and not worry that the program is malicious or not. Now, you should be aware ofthese programs," said Miller, as quoted by Reuters on Thursday(8/11/2011) .
Apple is said by security that hackers could have created an applicationthen secretly install programs that can steal user data, send SMS, orrummaging through the information in it.
Miller himself had previously found a bug in the text messaging systemowned iPhones in 2009. This bug makes the attacker can take over control of these devices.
Researchers Find Defects in iPhone Software
Advertisement
Advertisement
Artikel Terkait Researchers Find Defects in iPhone Software :
Sony Split TV Business UnitSony plans to split his TV business into three. This is part of Sony's effort to res ...
Survey: Parents Help Kids 'Lying' on FacebookResearch conducted by Microsoft Research in the United States related tothe use of Facebook reveals ...
IPad Glory Threatened by Android & Windows 8The dominance of the iPad in the segment of computer tablet, many predicted would be broken. ...
The 2012 Gadget: Samsung Galaxy Tab 7.0 Plus!Be prepared to upgrade your gadgets in 2012, since the latest series of Samsung Gala ...
Nikon D800 Cheaper than the Canon EOS 1DX?News of the arrival of the Nikon D800 was surprising, because he expected to be equipped ...
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment